Tests Help
Security Settings – Windows
B-27
How Does this Affect Me?:
Macros are simple programs that are used to repeat
commands and keystrokes within another program. A macro can be invoked
(run) with a simple command that you assign, such as [ctrl]+[shift]+[r]. Some
viruses are macro viruses and are hidden within a document. When you open
an infected document, the macro virus runs. A macro virus can save itself to
other files (such as the Normal template) and can potentially infect all of your
files. If a user on another computer opens the infected file, the virus can spread
to their computer as well.
What Do I Need to Do? :
Set the Microsoft Outlook macro security level as fol-
lows:
1.
Open Outlook.
2.
Select
Tools>>Macro>>Security>>Security Level tab
.
3.
Select
High, Medium
, or
Low
.
4.
Click
ok
.
Microsoft Word Macros
Description:
This test verifies that the endpoint attempting to connect to your
system has the Microsoft Word macro security level specified by your security
standards.
Test Properties:
Select the minimum Microsoft Word macro setting for that is
required in order for an endpoint to connect to your network.
■
Very High
. Only macros installed in trusted locations will be allowed
to run. All other signed and unsigned macros are disabled.
■
High
. Only signed macros from trusted sources will be allowed to run.
Unsigned macros are automatically disabled.
■
Medium
. You can choose whether or not to run potentially unsafe
macros.
■
Low
. (
not recommended
). You are not protected from potentially
unsafe macros. Use this setting only if you have virus scanning
software installed, or you have checked the safety of all documents
you open.
How Does this Affect Me?:
Macros are simple programs that are used to repeat
commands and keystrokes within another program. A macro can be invoked
(run) with a simple command that you assign, such as [ctrl]+[shift]+[r]. Some
viruses are macro viruses and are hidden within a document. When you open
an infected document, the macro virus runs. A macro virus can save itself to
Содержание ProCurve NAC 800
Страница 1: ...HP ProCurve Network Access Controller 800 Users Guide ...
Страница 2: ......
Страница 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Страница 32: ...Introduction Technical Support 1 14 Technical Support Technical support is available through www procurve com ...
Страница 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Страница 71: ...System Configuration Management Server 3 23 Figure 3 9 System Configuration Management Server ...
Страница 80: ...System Configuration User Accounts 3 32 Figure 3 12 System Configuration User Accounts ...
Страница 88: ...System Configuration User Roles 3 40 Figure 3 16 System Configuration User Roles ...
Страница 100: ...System Configuration Quarantining General 3 52 1 Select a cluster Figure 3 23 System Configuration Quarantining ...
Страница 171: ...System Configuration Cluster Setting Defaults 3 123 Figure 3 55 System Configuration Agentless Credentials ...
Страница 180: ... This page intentionally left blank ...
Страница 208: ... This page intentionally left blank ...
Страница 234: ...End user Access Mac OS X Endpoint Settings 5 26 Figure 5 14 Mac System Preferences ...
Страница 288: ... This page intentionally left blank ...
Страница 302: ... This page intentionally left blank ...
Страница 303: ...8 1 8 High Availability and Load Balancing Chapter Contents High Availability 8 2 Load Balancing 8 6 ...
Страница 306: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Страница 307: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Страница 309: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Страница 312: ... This page intentionally left blank ...
Страница 315: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Страница 318: ... This page intentionally left blank ...
Страница 323: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Страница 324: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Страница 380: ... This page intentionally left blank ...
Страница 418: ... This page intentionally left blank ...
Страница 425: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Страница 459: ...System Administration Creating and Replacing SSL Certificates 15 31 10 Save and exit the file ...
Страница 468: ... This page intentionally left blank ...
Страница 480: ... This page intentionally left blank ...
Страница 526: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Страница 532: ... This page intentionally left blank ...
Страница 535: ...Important Browser Settings Pop up Windows C 3 1 Clear the Block Popup Windows check box 2 Close the Content window ...
Страница 562: ... This page intentionally left blank ...
Страница 590: ... This page intentionally left blank ...